+ All Categories
Home > Business > How I Hacked Your Wireless LAN � And How to Stop Me

How I Hacked Your Wireless LAN � And How to Stop Me

Date post: 05-Dec-2014
Category:
Upload: digitallibrary
View: 6,123 times
Download: 3 times
Share this document with a friend
Description:
Wireless LANs are popping up everywhere�in homes, hotspots and businesses. Get a first-hand look at wireless LAN attacks that have occurred, an appraisal of various risk models that address real dangers (not just hype) and a vendor-neutral review of wireless security technologies on the market.
21
1 How I Hacked Your Wireless LAN (And how to stop me...) How I Hacked Your Wireless LAN (And how to stop me...) JON GREEN, CISSP “How I Hacked Your Wireless LAN – And How to Stop Me” Session A3, April 27 2008 Disclaimer I might be smart enough to hack your wireless LAN, but I don’t have time. I work for Aruba and have an 2 year old child to chase around. Don’t blame me.
Transcript
Page 1: How I Hacked Your Wireless LAN � And How to Stop Me

1

How I Hacked Your Wireless LAN(And how to stop me...)How I Hacked Your Wireless LAN(And how to stop me...)

JON GREEN, CISSP

“How I Hacked Your Wireless LAN – And How to Stop Me”

Session A3, April 27 2008

Disclaimer• I might be smart enough to hack your wireless LAN, but I

don’t have time. I work for Aruba and have an 2 year old child to chase around. Don’t blame me.

Page 2: How I Hacked Your Wireless LAN � And How to Stop Me

2

Is This How You Think About Wireless?

The truth:Wireless is MORE secure than wiredsecure than wired(if you do it right)

Wired Network Security Questions

On your wired network...• Do you authenticate all users and devices?• Do you encrypt all traffic?Do you encrypt all traffic?• Do you control access to network resources

based on user identity?

Wi l l t d ll f thi b d i• Wireless lets you do all of this – by design

Page 3: How I Hacked Your Wireless LAN � And How to Stop Me

3

802.11 Technology and Vulnerabilities

PHY/MAC802.11a802.11b,

EAP/TLS,

RegulatoryDomain

Extensions

802.11g,Europe5 GHz,WPA

802.11i,WPA2,Japan

Radio ResourceMgmt, Fast Roaming,

early mesh deployments

MIMO,WAVE,Mesh,

ExternalI t t k

Performance,Net. Mgmt,3.65 GHz

Technology

1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009

EAP-MD5QoS

Japan5GHz,

EAP-FAST

Internetwork,Mgmt. Frame

ProtectionPEAP,TTLSLEAP

Windows wardriving

tools, growing attack tool

Sophisticated WEP attack tools, attacks against WPA-PSK, PHY jamming tools

commodityWIDS evasion,client attacks

Metasploit for Wireless Critical client driver vulns

AP Fuzzing?RADIUS Fuzzing?

TJX

Best Buy, Houston Court

System

BJ's

GE Money, PG&E

1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009

Vulnerabilities

Early wardriving,early WEP

attacks

attack tool sophistication

Hotspotimpersonation,LEAP exposed

y

Hotspotmanipulation,QoS attacks,

WIDS fingerprinting

client attacks gaining

popularity, fuzzing

RADIUS Fuzzing?802.11 VA Tools?

Attacks Against TKIP?Lowe's

BJ s

How NOT to Deploy Wireless!How NOT to Deploy Wireless!

Page 4: How I Hacked Your Wireless LAN � And How to Stop Me

4

Doing Nothing

• Wireless LAN equipment is cheap and easily available• If the IT department doesn’t deploy wireless, someone

else will• Where is the “security perimeter” today?• How do you enforce “No Wireless” policies?

What if we ignore wireless?

YourCompany

New York City

YourYouremployee

Employee’s a subscriber to public Wi-Fi hotspot serviceEmployee’s laptop automatically associates with public Wi-Fi hotspotPlugs into wired corporate networkTraffic bridged between public hotspot and enterprise network

Page 5: How I Hacked Your Wireless LAN � And How to Stop Me

5

RF Engineering• Using directional antennas to

direct and limit RF coverage does not work• RF is invisible• Physical environments change• Physical environments change

• Lowering transmit power or placing access points (APs) away from outside walls to limit RF “leakage” does not work

• Set RF coverage to optimize user experience not touser experience – not to control leakage

SSID Cloaking

• Some APs offer a feature to hide the SSID (Service Set Identifier or “wireless network name”) in ad ertisementsname”) in advertisements

• Hiding the SSID can discourage but cannot secure

• A person intent on network intrusion can run a simple tool to instantly reveal the SSID• The SSID should never be treated as though it were a

password

Page 6: How I Hacked Your Wireless LAN � And How to Stop Me

6

Discovering Cloaked SSIDs

linux:~# ./essid_jack -hEssid Jack: Proof of concept so people will stop calling an ssid a password.

Usage: ./essid jack -b <bssid> [ -d <destination mac> ] [ -c <channel number> ] [ -ig _j [ ] [ ] [ccc.gif <interface name> ]

-b: bssid, the mac address of the access point (e.g. 00:de:ad:be:ef:00)-d: destination mac address, defaults to broadcast address.-c: channel number (1-14) that the access point is on,defaults to current.-i: the name of the AirJack interface to use (defaults toaj0).

linux:~# essid_jack -b 00:03:2d:de:ad: -c 11Got it the essid is (escape characters are c style):Got it, the essid is (escape characters are c style):“s3kr1t_wl4n"

MAC Address Filtering

• Some APs offer “MAC address filtering”

• Does not scale to large networks

• Trivial to defeat

Page 7: How I Hacked Your Wireless LAN � And How to Stop Me

7

WEP

• WEP stands for “Wired Equivalent Privacy”• Badly broken

Static versus Dynamic WEP• Static versus Dynamic WEP• Static WEP: everyone uses the same key, all the time• Dynamic WEP: everyone uses a different key, assigned

at each authentication

• Static WEP is evil. Avoid it. • Dynamic WEP is slightly better, but it is still

WEP

Attacking WEP - Aircrack• Goal: Capture frames with weak IVs (Initialization Vectors)• Need 50K-200K frames for 64-bit key, 200K-700K for 128-bit

key

Page 8: How I Hacked Your Wireless LAN � And How to Stop Me

8

Attacking WEP – Speeding things up• Use “void11” to deauthenticate clients from the WLAN,

then let them reassociate – this generates valid data traffic• But this interferes with normal WLAN operation – people will notice

• Use “Aireplay”• Capture a valid ARP packet• Replay it to the WLAN over and over• Generate lots of frames

Result:• Result:• 64-bit keys cracked in ~5 minutes • 128-bit keys cracked in ~10 minutes.

Cisco LEAP

• Cisco invented LEAP to solve key distribution problems

• Vulnerable to dictionary attacks• LEAP cracking tool is called ASLEAP• Currently considered

broken and unsuitablefor use

Page 9: How I Hacked Your Wireless LAN � And How to Stop Me

9

How to Stop MeHow to Stop Me

Let’s start here...AES-CCMP Block Diagram

E E...paddingpadding

... E

BrB0 B1 Bk

Header Message Tag

...

Not encrypted

00 Bk+1...

DC

Sm

A1 AmE EA0 E

yp

Sm...S1 SmS0

DC

Page 10: How I Hacked Your Wireless LAN � And How to Stop Me

10

PROTECTING THE AIRRF Spectrum SecurityWireless IDS

PROTECTING THE NETWORKStrong Authentication

PROTECTING THE CONNECTIONPer-Packet Authentication, CentralizedEncryption

PROTECTING THE USERStateful Per User Firewalls

A Layered Approach to Wireless SecurityA Layered Approach to Wireless Security

PROTECTING THE DATAWPA2 and AES

Enterprise Assets

Centralization solves security and TCO for WLANs

Centralized

Centralization is the First StepCentralization is the First Step

Centralized Mobility Controller

Policy

Mobility

Forwarding

Management

“Thin” Access Points802.11a/b/g

Antennas

Forwarding

Encryption

Authentication

“Fat” Access Points

Page 11: How I Hacked Your Wireless LAN � And How to Stop Me

11

Controlling “Uncontrolled Wireless”

• AP detection• See all APs

• AP classification• AP classification• Are they neighbors?• Or are they a threat?

• Rogue containment• Stop users from

accessing rogue APs and leave neighbors galone

Wireless Intrusion Detection/Protection

Page 12: How I Hacked Your Wireless LAN � And How to Stop Me

12

Authentication with 802.1x

• Authenticates users before granting access to L2 media

• Makes use of EAP (Extensible Authentication Protocol) – evolved from PPP• PEAP, EAP-TLS, EAP-TTLS,

etc.

802 1 th ti ti• 802.1x authentication happens at L2 – users will be authenticated before an IP address is assigned

Authentication with 802.1x

EAPOL (EAP over LAN) RADIUS

E t d T l

AuthenticationServerAP/Controller

STA

Encrypted Tunnel

Page 13: How I Hacked Your Wireless LAN � And How to Stop Me

13

802.1x Acronym Soup

• PEAP (Protected EAP)• Uses a digital certificate on the network side• Password or certificate on the client side• Password or certificate on the client side

• EAP-TLS (EAP with Transport Level Security)• Uses a certificate on network side• Uses a certificate on client side

• TTLS (Tunneled Transport Layer Security)• Uses a certificate on the network side

P d t k tifi t th li t id• Password, token, or certificate on the client side

• EAP-FAST• Cisco proprietary• Do not use – known security weaknesses

Encrypt the Data

• If intruders can’t read the data, there’s no need to worry where it goes• WEP

• Encryption using RC4• Simple to do, easy to crack• No key management• Don’t do it

• TKIP (Temporal Key Integrity Protocol)• Encryption using RC4• Works on legacy hardware• No major weaknesses known

• CCMP/AES• CCMP/AES• Encryption using AES• Considered state-of-the-art • FIPS 140-2 approved• May require new hardware

Page 14: How I Hacked Your Wireless LAN � And How to Stop Me

14

Combining Authentication & Encryption: WPA

• WPA == Wi-Fi Protected Access

• WPA“• Wi-Fi Alliance “standard” based on pre-802.11i

• Includes TKIP for encryption

• WPA2• Wi-Fi Alliance “standard” based on ratified 802.11i• Includes TKIP and CCMP for encryption

• For both:• WPA-Enterprise == 802.1x for authentication, dynamic encryption• WPA-Personal == pre-shared authentication key

Pre-Shared Key Authentication Cannot Scale

• WPA/WPA2 accommodates authentication using IEEE 802.1X or a pre-shared key• PSK authentication is "WPA-Personal", 802.1X is "WPA-Enterprise“

• WPA-Personal is deployed without the complexity of IEEE 802.1X, no EAP type configuration• Attractive to deploy, but insecure

• Like WEP, PSK authentication is weak and cannot scale• Subject to offline dictionary attacks• Subject to offline dictionary attacks• A stolen/lost device with PSK mandates rotation of all PSK's

throughout the organization• How many people require knowledge of the key?• Is the key stored on laptops accessible to users?

Page 15: How I Hacked Your Wireless LAN � And How to Stop Me

15

Configure WPA Properly• Configure the Common

Name of your RADIUS server (matches CN in server certificate)server certificate)

• Configure trusted CAs (an in-house CA is better than a public CA)

• ALWAYS validate the server certificateDo not allow users to• Do not allow users to add new CAs or trust new servers

• Enforce with group policy

Captive Portals

• Browser-based authenticationSSL encrypted• SSL encrypted

• Permits registered user or guest access

• No inherent link-layer encryption

• Use with caution!

Page 16: How I Hacked Your Wireless LAN � And How to Stop Me

16

Authorize the Data

• Most organizations do a decent job of authentication (who the user is), but a poor job of authorization (what the user is allowed to do)

• Mobile networks are typically multi-use• Authentication provides you with user identity – now use

it! Identity-aware firewall policies can restrict what a user can do, based on that user’s needs

EmployeeRadius Server

EmployeeRadius Server

Virtual AP 1SSID: CORP

Virtual AP 2SSID: GUEST

Guest user

VoIP Device

Contractor

Default VLAN

Layer 2 Switch

RouterFirewall Captive

Portal

DHCPPool

Firewall

Virtual AP 1SSID: CORP

Virtual AP 2SSID: GUEST

Guest user

VoIP Device

Contractor

Default VLAN

Layer 2 Switch

RouterFirewall Captive

Portal

DHCPPool

Firewall

Why Worry About Authorization?

Where is the “network perimeter” today?

Mobility brings us:

Ouch!

Disappearance of physical securityNew mobile users, devices appearing everydayIncreased exposure to malware

Assuming that “the bad guys are outside the firewall, the good guys are inside” is a recipe for disaster

Page 17: How I Hacked Your Wireless LAN � And How to Stop Me

17

Today’s Wireless Gold Standard

• Centralized wireless• Keep clients updated – drivers too!• Wireless intrusion detection

• Control uncontrolled wireless• Control uncontrolled wireless• Locate and protect against rogue APs

• WPA-2• Device authentication using 802.1x and PEAP• User authentication using 802.1x and PEAP• AES for link-layer encryption

• Strong passwords• SecureID or other token-card products• Strong password policies

• Authorization with identity-aware firewalls• Protect wireless users from other wireless users• Another layer of defense

What’s Left?What’s Left?

Page 18: How I Hacked Your Wireless LAN � And How to Stop Me

18

Attacking Preferred Networks List (PNL)

• Multiple tools to abuse preferred network list on clients• Hotspotter

R Gl AP• RawGlueAP• KARMA

• When and how stations roam still driver-implementation dependent

• Can be abused by attackers

KARMA

• Listens for probes in monitor mode• Becomes AP for all probed networks• Includes extensive support for fake services to manipulate

client connectivity (XML)• Fake SMB, FTP, HTTP

• Bring Your Own eXploit (BYOX) model

“… a number of client-side exploits have been written, tested pand demonstrated within this framework. Some may be included in a future release. Automated agent deployment is also planned.”

Page 19: How I Hacked Your Wireless LAN � And How to Stop Me

19

KARMA Example

Windows XP PNL Weakness

• Empty PNL, XP still probes with uninitialized memory contents as SSID

• Will associate to networks using this SSID, fno popup notification

Page 20: How I Hacked Your Wireless LAN � And How to Stop Me

20

Client Drivers• Basic secure programming rule: Sanitize all user input• “Fuzzing” attacks send random data to software inputs

• Stuff that comes in over the air is user input

802 11 i d th l t f d i ft• 802.11n is around the corner – lots of new driver software going into production• Are these well written? Well tested? Secure?

Summary

• At a minimum, you must put measures in place to control “uncontrolled wireless”

• Wireless networks are more secure than• Wireless networks are more secure than the average wired network• But only when properly secured

• Wireless security has evolved rapidly in the past 4 years – tools and information are not common knowledge• Use vendors to help you – they live this every

day

Page 21: How I Hacked Your Wireless LAN � And How to Stop Me

21

Q & AQ & A

[email protected]


Recommended